Social Engineering - Are you the weakest link?

Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.

If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.

Targeted threats using zero-day malware embedded in file downloads and email attachments are increasingly used to attack organizations like yours. Unfortunately these bleeding-edge attacks are often undetectable by traditional anti-virus engines.

So what can you do to keep yourself secure?

Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.

In the session we’ll cover:
• Why organizations like yours need sandboxing
• How Sophos Sandstorm keeps you secure against the latest threats
• Getting started with sandbox protection that’s simple to use and affordable

With over 17 years’ experience in information security, Peter currently specializes in Sophos advanced threat and Web security solutions.

Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.
If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.

Enabling the latest mobile technology while keeping your organisation’s data safe can be a challenge. Secure, monitor and control mobile devices with Sophos solutions. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) or Choose your own device (CYOD) from becoming an IT nightmare.

This webinar addresses the major mobility challenges for IT managers and their teams and demonstrate effective solutions with Sophos Mobile Control.